Skip to main content

Showing 1–28 of 28 results for author: Janssen, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.15275  [pdf, other

    eess.IV cs.CV q-bio.QM

    NMGrad: Advancing Histopathological Bladder Cancer Grading with Weakly Supervised Deep Learning

    Authors: Saul Fuster, Umay Kiraz, Trygve Eftestøl, Emiel A. M. Janssen, Kjersti Engan

    Abstract: The most prevalent form of bladder cancer is urothelial carcinoma, characterized by a high recurrence rate and substantial lifetime treatment costs for patients. Grading is a prime factor for patient risk stratification, although it suffers from inconsistencies and variations among pathologists. Moreover, absence of annotations in medical imaging difficults training deep learning models. To addres… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: https://github.com/Biomedical-Data-Analysis-Laboratory/GradeMIL

  2. arXiv:2405.15264  [pdf, other

    cs.CV cs.AI

    Self-Contrastive Weakly Supervised Learning Framework for Prognostic Prediction Using Whole Slide Images

    Authors: Saul Fuster, Farbod Khoraminia, Julio Silva-Rodríguez, Umay Kiraz, Geert J. L. H. van Leenders, Trygve Eftestøl, Valery Naranjo, Emiel A. M. Janssen, Tahlita C. M. Zuiverloon, Kjersti Engan

    Abstract: We present a pioneering investigation into the application of deep learning techniques to analyze histopathological images for addressing the substantial challenge of automated prognostic prediction. Prognostic prediction poses a unique challenge as the ground truth labels are inherently weak, and the model must anticipate future events that are not directly observable in the image. To address thi… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: https://github.com/Biomedical-Data-Analysis-Laboratory/HistoPrognostics

  3. arXiv:2403.07743  [pdf, other

    eess.IV cs.AI cs.CV cs.LG

    Equip** Computational Pathology Systems with Artifact Processing Pipelines: A Showcase for Computation and Performance Trade-offs

    Authors: Neel Kanwal, Farbod Khoraminia, Umay Kiraz, Andres Mosquera-Zamudio, Carlos Monteagudo, Emiel A. M. Janssen, Tahlita C. M. Zuiverloon, Chunmig Rong, Kjersti Engan

    Abstract: Histopathology is a gold standard for cancer diagnosis under a microscopic examination. However, histological tissue processing procedures result in artifacts, which are ultimately transferred to the digitized version of glass slides, known as whole slide images (WSIs). Artifacts are diagnostically irrelevant areas and may result in wrong deep learning (DL) algorithms predictions. Therefore, detec… ▽ More

    Submitted 23 May, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: Submitted to BMC Medical Informatics and Decision Making Journal

  4. arXiv:2401.10397  [pdf, other

    cs.CV

    Analyzing and Mitigating Bias for Vulnerable Classes: Towards Balanced Representation in Dataset

    Authors: Dewant Katare, David Solans Noguero, Souneil Park, Nicolas Kourtellis, Marijn Janssen, Aaron Yi Ding

    Abstract: The accuracy and fairness of perception systems in autonomous driving are essential, especially for vulnerable road users such as cyclists, pedestrians, and motorcyclists who face significant risks in urban driving environments. While mainstream research primarily enhances class performance metrics, the hidden traits of bias inheritance in the AI models, class imbalances and disparities within the… ▽ More

    Submitted 12 May, 2024; v1 submitted 18 January, 2024; originally announced January 2024.

  5. arXiv:2312.08766  [pdf, other

    eess.IV cs.CV cs.LG

    A Dual Convolutional Neural Network Pipeline for Melanoma Diagnostics and Prognostics

    Authors: Marie Bø-Sande, Edvin Benjaminsen, Neel Kanwal, Saul Fuster, Helga Hardardottir, Ingrid Lundal, Emiel A. M. Janssen, Kjersti Engan

    Abstract: Melanoma is a type of cancer that begins in the cells controlling the pigment of the skin, and it is often referred to as the most dangerous skin cancer. Diagnosing melanoma can be time-consuming, and a recent increase in melanoma incidents indicates a growing demand for a more efficient diagnostic process. This paper presents a pipeline for melanoma diagnostics, leveraging two convolutional neura… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: Accepted at NLDL 2024

  6. arXiv:2310.11957  [pdf, other

    cs.DC eess.SP

    Supporting UAVs with Edge Computing: A Review of Opportunities and Challenges

    Authors: Malte Janßen, Tobias Pfandzelter, Minghe Wang, David Bermbach

    Abstract: Over the last years, Unmanned Aerial Vehicles (UAVs) have seen significant advancements in sensor capabilities and computational abilities, allowing for efficient autonomous navigation and visual tracking applications. However, the demand for computationally complex tasks has increased faster than advances in battery technology. This opens up possibilities for improvements using edge computing. In… ▽ More

    Submitted 18 October, 2023; originally announced October 2023.

    Report number: MCC.2023.3

  7. arXiv:2307.09426  [pdf, other

    cs.AI cs.CE cs.CR

    Balancing Privacy and Progress in Artificial Intelligence: Anonymization in Histopathology for Biomedical Research and Education

    Authors: Neel Kanwal, Emiel A. M. Janssen, Kjersti Engan

    Abstract: The advancement of biomedical research heavily relies on access to large amounts of medical data. In the case of histopathology, Whole Slide Images (WSI) and clinicopathological information are valuable for develo** Artificial Intelligence (AI) algorithms for Digital Pathology (DP). Transferring medical data "as open as possible" enhances the usability of the data for secondary purposes but pose… ▽ More

    Submitted 8 August, 2023; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: Accepted to FAIEMA 2023

  8. arXiv:2304.14271  [pdf, other

    cs.RO cs.AI cs.LG

    A Survey on Approximate Edge AI for Energy Efficient Autonomous Driving Services

    Authors: Dewant Katare, Diego Perino, Jari Nurmi, Martijn Warnier, Marijn Janssen, Aaron Yi Ding

    Abstract: Autonomous driving services rely heavily on sensors such as cameras, LiDAR, radar, and communication modules. A common practice of processing the sensed data is using a high-performance computing unit placed inside the vehicle, which deploys AI models and algorithms to act as the brain or administrator of the vehicle. The vehicular data generated from average hours of driving can be up to 20 Terab… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

  9. arXiv:2303.05752  [pdf, other

    eess.IV cs.CV

    Deep Learning for Predicting Metastasis on Melanoma WSIs

    Authors: Christopher Andreassen, Saul Fuster, Helga Hardardottir, Emiel A. M. Janssen, Kjersti Engan

    Abstract: Northern Europe has the second highest mortality rate of melanoma globally. In 2020, the mortality rate of melanoma rose to 1.9 per 100 000 habitants. Melanoma prognosis is based on a pathologist's subjective visual analysis of the patient's tumor. This methodology is heavily time-consuming, and the prognosis variability among experts is notable, drastically jeopardizing its reproducibility. Thus,… ▽ More

    Submitted 10 March, 2023; originally announced March 2023.

  10. Detection and Localization of Melanoma Skin Cancer in Histopathological Whole Slide Images

    Authors: Neel Kanwal, Roger Amundsen, Helga Hardardottir, Luca Tomasetti, Erling Sandoy Undersrud, Emiel A. M. Janssen, Kjersti Engan

    Abstract: Melanoma diagnosed and treated in its early stages can increase the survival rate. A projected increase in skin cancer incidents and a dearth of dermatopathologists have emphasized the need for computational pathology (CPATH) systems. CPATH systems with deep learning (DL) models have the potential to identify the presence of melanoma by exploiting underlying morphological and cellular features. Th… ▽ More

    Submitted 4 November, 2023; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: Accepted at EUSIPCO 23

    Journal ref: 10.23919/EUSIPCO58844.2023.10290087

  11. arXiv:2103.13287  [pdf, other

    cs.CY cs.CR cs.HC

    Human Factors in Security Research: Lessons Learned from 2008-2018

    Authors: Mannat Kaur, Michel van Eeten, Marijn Janssen, Kevin Borgolte, Tobias Fiebig

    Abstract: Instead of only considering technology, computer security research now strives to also take into account the human factor by studying regular users and, to a lesser extent, experts like operators and developers of systems. We focus our analysis on the research on the crucial population of experts, whose human errors can impact many systems at once, and compare it to research on regular users. To u… ▽ More

    Submitted 24 March, 2021; originally announced March 2021.

  12. arXiv:1912.04614  [pdf, other

    eess.SP cs.IT

    Time Delay Estimation from Multiband Radio Channel Samples in Nonuniform Noise

    Authors: Tarik Kazaz, Gerard J. M. Janssen, Alle-Jan van der Veen

    Abstract: The multipath radio channel is considered to have a non-bandlimited channel impulse response. Therefore, it is challenging to achieve high resolution time-delay (TD) estimation of multipath components (MPCs) from bandlimited observations of communication signals. It this paper, we consider the problem of multiband channel sampling and TD estimation of MPCs. We assume that the nonideal multibranch… ▽ More

    Submitted 10 December, 2019; originally announced December 2019.

    Comments: 4 pages, 6 figures, (ACSSC 2019) 2019 Asilomar Conference on Signals, Systems, and Computers

  13. Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure

    Authors: Aaron Yi Ding, Gianluca Limon De Jesus, Marijn Janssen

    Abstract: The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practi… ▽ More

    Submitted 24 September, 2019; originally announced September 2019.

    Comments: Pre-print version for conference publication at ICTRS 2019

  14. Multiresolution time-of-arrival estimation from multiband radio channel measurements

    Authors: Tarik Kazaz, Raj Thilak Rajan, Gerard J. M. Janssen, Alle-Jan van der Veen

    Abstract: Achieving high resolution time-of-arrival (TOA) estimation in multipath propagation scenarios from bandlimited observations of communication signals is challenging because the multipath channel impulse response (CIR) is not bandlimited. Modeling the CIR as a sparse sequence of Diracs, TOA estimation becomes a problem of parametric spectral inference from observed bandlimited signals. To increase r… ▽ More

    Submitted 18 April, 2019; originally announced April 2019.

    Comments: 5 pages, 5 figures, conference

  15. arXiv:1812.01221  [pdf, other

    eess.SP cs.IT

    Joint Ranging and Clock Synchronization for Dense Heterogeneous IoT Networks

    Authors: Tarik Kazaz, Mario Coutino, Gerard J. M. Janssen, Geert Leus, Alle-Jan van der Veen

    Abstract: Synchronization and ranging in internet of things (IoT) networks are challenging due to the narrowband nature of signals used for communication between IoT nodes. Recently, several estimators for range estimation using phase difference of arrival (PDoA) measurements of narrowband signals have been proposed. However, these estimators are based on data models which do not consider the impact of cloc… ▽ More

    Submitted 4 December, 2018; originally announced December 2018.

    Comments: 52nd Annual Asilomar Conference on Signals, Systems, and Computers

  16. 5G Applications: Requirements, Challenges, and Outlook

    Authors: Aaron Yi Ding, Marijn Janssen

    Abstract: The increasing demand for mobile network capacity driven by Internet of Things (IoT) applications results in the need for understanding better the potential and limitations of 5G networks. Vertical application areas like smart mobility, energy networks, industrial IoT applications, and AR/VR enhanced services all pose different requirements on the use of 5G networks. Some applications need low lat… ▽ More

    Submitted 14 October, 2018; originally announced October 2018.

    Comments: Author version for conference publication at ICTRS 2018

  17. arXiv:1707.02191  [pdf, other

    cs.CV

    Design and Processing of Invertible Orientation Scores of 3D Images for Enhancement of Complex Vasculature

    Authors: M. H. J. Janssen, A. J. E. M. Janssen, E. J. Bekkers, J. Olivan Bescos, R. Duits

    Abstract: The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical imaging applications. To handle complex crossing structures in 2D images, 2D orientation scores $U: \mathbb{R} ^ 2\times S ^ 1 \rightarrow \mathbb{C}$ were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores… ▽ More

    Submitted 27 November, 2017; v1 submitted 7 July, 2017; originally announced July 2017.

    MSC Class: 62H35; 65T60; 58J65; 37L05

  18. arXiv:1706.01727  [pdf, other

    cs.SI math.PR physics.soc-ph

    Clustering Spectrum of scale-free networks

    Authors: Clara Stegehuis, Remco van der Hofstad, Johan S. H. van Leeuwaarden, A. J. E. M Janssen

    Abstract: Real-world networks often have power-law degrees and scale-free properties such as ultra-small distances and ultra-fast information spreading. In this paper, we study a third universal property: three-point correlations that suppress the creation of triangles and signal the presence of hierarchy. We quantify this property in terms of $\bar c(k)$, the probability that two neighbors of a degree-$k$… ▽ More

    Submitted 5 October, 2017; v1 submitted 6 June, 2017; originally announced June 2017.

    Journal ref: Phys. Rev. E 96, 042309 (2017)

  19. arXiv:1611.02429  [pdf, ps, other

    cs.SE

    Complementing Model Learning with Mutation-Based Fuzzing

    Authors: Rick Smetsers, Joshua Moerman, Mark Janssen, Sicco Verwer

    Abstract: An ongoing challenge for learning algorithms formulated in the Minimally Adequate Teacher framework is to efficiently obtain counterexamples. In this paper we compare and combine conformance testing and mutation-based fuzzing methods for obtaining counterexamples when learning finite state machine models for the reactive software systems of the Rigorous Exampination of Reactive Systems (RERS) chal… ▽ More

    Submitted 8 November, 2016; originally announced November 2016.

    Comments: Submitted to the RERS challenge 2016

  20. arXiv:1511.09236  [pdf, other

    physics.soc-ph cs.SI physics.data-an

    Giant component sizes in scale-free networks with power-law degrees and cutoffs

    Authors: A. J. E. M. Janssen, Johan S. H. van Leeuwaarden

    Abstract: Scale-free networks arise from power-law degree distributions. Due to the finite size of real-world networks, the power law inevitably has a cutoff at some maximum degree $Δ$. We investigate the relative size of the giant component $S$ in the large-network limit. We show that $S$ as a function of $Δ$ increases fast when $Δ$ is just large enough for the giant component to exist, but increases ever… ▽ More

    Submitted 30 November, 2015; originally announced November 2015.

  21. arXiv:1511.07616  [pdf, other

    physics.soc-ph cs.SI

    Attention Dynamics in Collaborative Knowledge Creation

    Authors: Lingfei Wu, Marco A. Janssen

    Abstract: To uncover the mechanisms underlying the collaborative production of knowledge, we investigate a very large online Question and Answer system that includes the question asking and answering activities of millions of users over five years. We created knowledge networks in which nodes are questions and edges are the successive answering activities of users. We find that these networks have two commo… ▽ More

    Submitted 24 November, 2015; originally announced November 2015.

    Comments: 11 pages, 3 figures

  22. arXiv:1509.07813  [pdf

    cs.SI physics.soc-ph

    Taking a moment to measure Networks - A hierarchical approach

    Authors: Kehinde R. Salau, Jacopo A. Baggio, Marco A. Janssen, Joshua K. Abbott, Eli P. Fenichel

    Abstract: Network-theoretic tools contribute to understanding real-world system dynamics, e.g., in wildlife conservation, epidemics, and power outages. Network visualization helps illustrate structural heterogeneity; however, details about heterogeneity are lost when summarizing networks with a single mean-style measure. Researchers have indicated that a hierarchical system composed of multiple metrics may… ▽ More

    Submitted 25 September, 2015; originally announced September 2015.

    Comments: Main Paper: 32 Pages, Suppl0Material: 9 pages

    ACM Class: I.2.11; C.2.1

  23. arXiv:1509.05083  [pdf, other

    physics.soc-ph cs.SI

    The Role of Diverse Strategies in Sustainable Knowledge Production

    Authors: Lingfei Wu, Jacopo A. Baggio, Marco A. Janssen

    Abstract: Online communities are becoming increasingly important as platforms for large-scale human cooperation. These communities allow users seeking and sharing professional skills to solve problems collaboratively. To investigate how users cooperate to complete a large number of knowledge-producing tasks, we analyze StackExchange, one of the largest question and answer systems in the world. We construct… ▽ More

    Submitted 24 November, 2015; v1 submitted 16 September, 2015; originally announced September 2015.

    Comments: 10 pages, 3 figures

  24. arXiv:1507.04775  [pdf, other

    physics.soc-ph cs.SI

    Adoption as a Social Marker: Innovation Diffusion with Outgroup Aversion

    Authors: Paul E. Smaldino, Marco A. Janssen, Vicken Hillis, Jenna Bednar

    Abstract: Social identities are among the key factors driving behavior in complex societies. Signals of social identity are known to influence individual behaviors in the adoption of innovations. Yet the population-level consequences of identity signaling on the diffusion of innovations are largely unknown. Here we use both analytical and agent-based modeling to consider the spread of a beneficial innovatio… ▽ More

    Submitted 21 July, 2016; v1 submitted 16 July, 2015; originally announced July 2015.

    Comments: 26 pages, 10 figures

  25. arXiv:1505.07690  [pdf, ps, other

    math.NA cs.CV

    Invertible Orientation Scores of 3D Images

    Authors: Michiel Janssen, Remco Duits, Marcel Breeuwer

    Abstract: The enhancement and detection of elongated structures in noisy image data is relevant for many biomedical applications. To handle complex crossing structures in 2D images, 2D orientation scores were introduced, which already showed their use in a variety of applications. Here we extend this work to 3D orientation scores. First, we construct the orientation score from a given dataset, which is achi… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

    Comments: ssvm 2015 published version in LNCS contains a mistake (a switch notation spherical angles) that is corrected in this arxiv version

  26. arXiv:1311.4439  [pdf, ps, other

    cs.IT

    60 GHz Wireless Link Within Metal Enclosures: Channel Measurements and System Analysis

    Authors: Seyran Khademi, Sundeep Prabhakar Chepuri, Zoubir Irahhauten, Gerard J. M. Janssen, Alle-Jan van der Veen

    Abstract: Wireless channel measurement results for 60 GHz within a closed metal cabinet are provided. A metal cabinet is chosen to emulate the environment within a mechatronic system, which have metal enclosures in general. A frequency domain sounding technique is used to measure the wireless channel for different volumes of the metal enclosure, considering both line-of-sight (LOS) and non-line-of-sight (NL… ▽ More

    Submitted 18 November, 2013; originally announced November 2013.

  27. arXiv:1004.1058  [pdf, ps, other

    cs.NI math.PR

    Optimal Tradeoff Between Exposed and Hidden Nodes in Large Wireless Networks

    Authors: P. M. van de Ven, A. J. E. M. Janssen, J. S. H. van Leeuwaarden

    Abstract: Wireless networks equipped with the CSMA protocol are subject to collisions due to interference. For a given interference range we investigate the tradeoff between collisions (hidden nodes) and unused capacity (exposed nodes). We show that the sensing range that maximizes throughput critically depends on the activation rate of nodes. For infinite line networks, we prove the existence of a threshol… ▽ More

    Submitted 7 April, 2010; originally announced April 2010.

  28. arXiv:1004.1042  [pdf, ps, other

    cs.NI math.PR

    Spatial fairness in linear wireless multi-access networks

    Authors: P. M. van de Ven, J. S. H. van Leeuwaarden, D. Denteneer, A. J. E. M. Janssen

    Abstract: Multi-access networks may exhibit severe unfairness in throughput. Recent studies show that this unfairness is due to local differences in the neighborhood structure: Nodes with less neighbors receive better access. We study the unfairness in saturated linear networks, and adapt the multi-access CSMA protocol to remove the unfairness completely, by choosing the activation rates of nodes appropriat… ▽ More

    Submitted 7 April, 2010; originally announced April 2010.